2020
DOI: 10.1007/978-3-030-51280-4_8
|View full text |Cite
|
Sign up to set email alerts
|

Coded Merkle Tree: Solving Data Availability Attacks in Blockchains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
123
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 61 publications
(124 citation statements)
references
References 17 publications
1
123
0
Order By: Relevance
“…On the other hand, we calculate a delay in the proposed scheme of O(log n). This result is coherent with current Blockchain proposals 49 where full nodes only need to perform O(log n) operations per block, with the help of data availability proofs.…”
Section: Resultssupporting
confidence: 85%
“…On the other hand, we calculate a delay in the proposed scheme of O(log n). This result is coherent with current Blockchain proposals 49 where full nodes only need to perform O(log n) operations per block, with the help of data availability proofs.…”
Section: Resultssupporting
confidence: 85%
“…Remark 1. While any erasure code can be used to encode the CMT, in this paper we focus on LDPC codes similar to [2] and provide new designs for the LDPC codes to reduce the probability of failure. Due to only making changes to the structure of the LDPC codes, we do not compromise on other performance metrics and their order-optimal solutions in [2].…”
Section: ) Cmt Constructionmentioning
confidence: 99%
“…In the rest of the paper, we assume P (l) (f,str) (s) is equal to the upper bound provided in Eqn (2). We find the light node sampling strategy by formulating a linear program (LP) in x , β (l) based on the above probabilities such that we get a lower probability of failure against the medium adversary and strong adversary compared to random sampling.…”
Section: Ldpc Code and Sampling Co-design For Medium And Strong Adversarymentioning
confidence: 99%
“…The object layer is commonly organized by the block layer. It uses merkleDAG [11] to maintain the connection between blocks. ObjectId can help users verify whether the data object has been modified.…”
Section: Decentralized Storage Systemsmentioning
confidence: 99%